Search results for: “law enforcement”
-

Volkswagen investigates 8Base ransomware data breach claims
Ransomware group 8Base has claimed responsibility for an alleged data theft from Volkswagen. The automaker confirmed a “security incident” but says core IT systems were unaffected.
-

Airport PA System Hack: How Attackers Hijacked Announcements in the US and Canada
Airport PA systems in the US and Canada were hijacked in October 2025, broadcasting unauthorized political messages and raising concerns about infrastructure security.
-

F5 Networks breach: what we know about the October 2025 incident
F5 Networks said its engineering systems were breached in October 2025 and that attackers removed development materials including code and reports.
-

Belgian data trader fined for illegal resale of data
The Belgian data trader Infobel has been hit with a €40,000 fine by the Belgian Data Protection Authority (GBA) for illegally reselling personal data for marketing purposes. The GBA found Infobel lacked proper consent from individuals, violating GDPR and emphasizing specific, active consent for data use.
-

Unnamed APT Exploits Zero-Days in Citrix and Cisco, Targeting Critical Infrastructure
An unnamed advanced persistent threat (APT) group exploited zero-day vulnerabilities in Citrix NetScaler ADC and Gateway, dubbed “CitrixBleed 2,” and a critical flaw in Cisco Identity Service Engine (ISE). The attacks targeted essential identity and network access control infrastructure.
-

UK Online Safety Push Sparks Transatlantic Free Speech Clash
A contentious legal battle is unfolding across the Atlantic, as the United Kingdom’s communications regulator, Ofcom, faces accusations of extraterritorial overreach in its enforcement of the Online Safety Act against American online platforms, reigniting a global debate on internet sovereignty and free speech.
-

What Is Bring Your Own Vulnerable Driver (BYOVD)?
Bring Your Own Vulnerable Driver (BYOVD) is a technique that leverages signed but vulnerable drivers to gain kernel-level access and evade security controls.